/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument 105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument 206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument 225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument 344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument 374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local [all...] |
/third_party/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument 105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument 206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument 225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument 344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument 374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | pkcs12.rs | 43 cert: parsed.cert.unwrap(), in parse() 55 let mut cert = ptr::null_mut(); in parse2() variables 62 &mut cert, in parse2() 67 let cert = X509::from_ptr_opt(cert); in parse2() 70 Ok(ParsedPkcs12_2 { pkey, cert, ca }) in parse2() 99 cert: None, in builder() 114 pub cert: X509, 120 pub cert 157 pub fn cert(&mut self, cert: &X509Ref) -> &mut Self { cert() functions [all...] |
/kernel/linux/common_modules/code_sign/ |
H A D | code_sign_ioctl.c | 41 code_sign_log_info("cert found"); in matched_cert_search() 46 code_sign_log_error("cert not found"); in matched_cert_search() 90 int cert_chain_insert(struct rb_root *root, struct cert_source *cert) in cert_chain_insert() argument 98 if (!(cert->path_type == RELEASE_DEVELOPER_CODE in cert_chain_insert() 99 || cert->path_type == DEBUG_DEVELOPER_CODE)) { in cert_chain_insert() 100 code_sign_log_error("no permission to insert code %d", cert->path_type); in cert_chain_insert() 110 int result = strcmp(cert->subject, this->subject); in cert_chain_insert() 118 result = strcmp(cert->issuer, this->issuer); in cert_chain_insert() 125 code_sign_log_info("cert already exist in trust sources"); in cert_chain_insert() 132 cert in cert_chain_insert() 143 cert_chain_remove(struct rb_root *root, struct cert_source *cert) cert_chain_remove() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument 159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert() 236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument 238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name() 246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument 258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex() 279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument 281 if (cert == NULL) in OCSP_RESPID_set_by_key() 283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key() 286 OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, const char *propq) OCSP_RESPID_match_ex() argument 322 OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) OCSP_RESPID_match() argument [all...] |
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument 159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert() 236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument 238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name() 246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument 258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex() 279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument 281 if (cert == NULL) in OCSP_RESPID_set_by_key() 283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key() 286 OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, const char *propq) OCSP_RESPID_match_ex() argument 322 OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) OCSP_RESPID_match() argument [all...] |
/foundation/communication/netstack/frameworks/native/net_ssl/ |
H A D | net_ssl.cpp | 25 uint32_t NetStackVerifyCertification(const CertBlob *cert)
in NetStackVerifyCertification() argument 27 if (cert == nullptr) {
in NetStackVerifyCertification() 31 return VerifyCert(cert);
in NetStackVerifyCertification() 34 uint32_t NetStackVerifyCertification(const CertBlob *cert, const CertBlob *caCert)
in NetStackVerifyCertification() argument 36 if (cert == nullptr || caCert == nullptr) {
in NetStackVerifyCertification() 40 return VerifyCert(cert, caCert);
in NetStackVerifyCertification()
|
H A D | net_ssl_verify_cert.cpp | 83 X509 *CertBlobToX509(const CertBlob *cert)
in CertBlobToX509() argument 87 if (cert == nullptr) {
in CertBlobToX509() 90 switch (cert->type) {
in CertBlobToX509() 92 x509 = PemToX509(cert->data, cert->size);
in CertBlobToX509() 94 NETSTACK_LOGE("x509 of PEM cert is nullptr\n");
in CertBlobToX509() 98 x509 = DerToX509(cert->data, cert->size);
in CertBlobToX509() 100 NETSTACK_LOGE("x509 of DER cert is nullptr\n");
in CertBlobToX509() 110 uint32_t VerifyCert(const CertBlob *cert)
in VerifyCert() argument 153 VerifyCert(const CertBlob *cert, const CertBlob *caCert) VerifyCert() argument [all...] |
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_cert.c | 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 135 OPENSSL_malloc(cert in ssl_cert_dup() [all...] |
/third_party/openssl/ssl/ |
H A D | ssl_cert.c | 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 135 OPENSSL_malloc(cert in ssl_cert_dup() [all...] |
/third_party/node/src/crypto/ |
H A D | crypto_common.h | 28 X509Pointer SSL_CTX_get_issuer(SSL_CTX* ctx, X509* cert); 96 X509* cert); 100 X509* cert, 105 X509* cert, 111 X509* cert); 113 v8::MaybeLocal<v8::Value> GetKeyUsage(Environment* env, X509* cert); 119 v8::MaybeLocal<v8::Value> GetSerialNumber(Environment* env, X509* cert); 121 v8::MaybeLocal<v8::Value> GetRawDERCertificate(Environment* env, X509* cert); 127 X509* cert, 131 X509* cert, [all...] |
/third_party/node/test/parallel/ |
H A D | test-https-options-boolean-check.js | 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 44 // Format ['key', 'cert'] 65 ].forEach(([key, cert]) => { 66 https.createServer({ key, cert }); 70 // Format ['key', 'cert', 'expected message'] 84 ].forEach(([key, cert, index]) => { 87 https.createServer({ key, cert }); [all...] |
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 18 X509 *cert, 38 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex() 63 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex() 68 if (pkey && cert) { in PKCS12_create_ex() 69 if (!X509_check_private_key(cert, pkey)) in PKCS12_create_ex() 71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 75 if (cert) { in PKCS12_create_ex() 77 name = (char *)X509_alias_get0(cert, &namelen); in PKCS12_create_ex() 82 pkeyid = X509_keyid_get0(cert, &pkeyidlen); in PKCS12_create_ex() 85 bag = pkcs12_add_cert_bag(&bags, cert, nam in PKCS12_create_ex() 37 PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_create_ex() argument 148 PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) PKCS12_create() argument [all...] |
/kernel/linux/linux-6.6/certs/ |
H A D | Makefile | 26 cmd_extract_certs = $(obj)/extract-cert "$(extract-cert-in)" $@ 27 extract-cert-in = $(filter-out $(obj)/extract-cert, $(real-prereqs)) 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE 70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI) 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert FORCE 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE 85 hostprogs := extract-cert 87 HOSTCFLAGS_extract-cert [all...] |
/third_party/curl/tests/libtest/ |
H A D | lib3102.c | 35 int cert; in is_chain_in_order() local 42 for(cert = 0; cert < cert_info->num_of_certs; cert++) { in is_chain_in_order() 43 struct curl_slist *slist = cert_info->certinfo[cert]; in is_chain_in_order() 61 printf("cert %d\n", cert); in is_chain_in_order() 69 fprintf(stderr, "cert %d issuer does not match cert %d subject\n", in is_chain_in_order() 70 cert in is_chain_in_order() [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
H A D | ssl_x509.c | 86 * @brief load a character certification context into system context. If '*cert' is pointed to the 89 X509* d2i_X509(X509 **cert, const unsigned char *buffer, long len) in d2i_X509() argument 98 if (cert && *cert) { in d2i_X509() 99 x = *cert; in d2i_X509() 215 if (ctx->cert->x509 == x) in SSL_CTX_use_certificate() 218 X509_free(ctx->cert->x509); in SSL_CTX_use_certificate() 220 ctx->cert->x509 = x; in SSL_CTX_use_certificate() 233 if (ssl->cert->x509 == x) in SSL_use_certificate() 236 X509_free(ssl->cert in SSL_use_certificate() [all...] |
/third_party/openssl/test/ |
H A D | x509aux.c | 41 X509 *cert = NULL; in test_certs() local 55 cert = d2i(NULL, &p, len); in test_certs() 57 if (cert == NULL || (p - data) != len) { in test_certs() 64 enclen = i2d(cert, NULL); in test_certs() 76 enclen = i2d(cert, &bufp); in test_certs() 101 err = X509_cmp(reuse, cert); in test_certs() 111 enclen = i2d(cert, &buf); in test_certs() 125 /* Encode just the cert and compare with initial encoding */ in test_certs() 130 enclen = i2d(cert, &buf); in test_certs() 138 TEST_error("encoded cert conten in test_certs() [all...] |
/foundation/communication/netmanager_base/test/netsysbpfstats/unittest/bpf_core_test/ |
H A D | BpfSSLTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netmanager_base/test/netmanagernative/unittest/netsys_core_test/ |
H A D | NetSysSSLTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netmanager_ext/test/vpnmanager/unittest/vpn_core_test/ |
H A D | VpnSSLTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netstack/test/unittest/http_test/ |
H A D | NetsslTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netstack/test/unittest/netssl/ |
H A D | NetsslTest.cpp | 55 CertBlob *cert = nullptr; in HWTEST_F() local 58 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 61 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 67 CertBlob cert; in HWTEST_F() local 70 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 73 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netstack/test/unittest/tcp_core_test/ |
H A D | TcpSocketSSLTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netmanager_ext/test/networksharemanager/unittest/netshare_core_test/ |
H A D | NetShareSSLTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|
/foundation/communication/netstack/test/unittest/websocket_core_test/ |
H A D | WebSocketSSLTest.cpp | 54 CertBlob *cert = nullptr; in HWTEST_F() local 57 uint32_t ret = NetStackVerifyCertification(cert); in HWTEST_F() 60 ret = NetStackVerifyCertification(cert, caCert); in HWTEST_F() 66 CertBlob cert; in HWTEST_F() local 69 uint32_t ret = NetStackVerifyCertification(&cert); in HWTEST_F() 72 ret = NetStackVerifyCertification(&cert, &caCert); in HWTEST_F()
|